306 research outputs found
RBATMWSN: Recursive Bayesian approach to trust management in wireless sensor networks
This paper introduces a new trust model and a reputation system for wireless sensor networks based on a sensed continuous data. It establishes the continuous version of the beta reputation system introduced in [1] and applied to binary events and presents a new Gaussian Reputation System for Sensor Networks (GRSSN) . We introduce a theoretically sound Bayesian probabilistic approach for mixing second-hand information from neighbouring nodes with directly observed information. Š2007 IEEE
TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources
In many dynamic open systems, agents have to interact with one another to achieve their goals. Here, agents may be self-interested, and when trusted to perform an action for another, may betray that trust by not performing the action as required. In addition, due to the size of such systems, agents will often interact with other agents with which they have little or no past experience. There is therefore a need to develop a model of trust and reputation that will ensure good interactions among software agents in large scale open systems. Against this background, we have developed TRAVOS (Trust and Reputation model for Agent-based Virtual OrganisationS) which models an agent's trust in an interaction partner. Specifically, trust is calculated using probability theory taking account of past interactions between agents, and when there is a lack of personal experience between agents, the model draws upon reputation information gathered from third parties. In this latter case, we pay particular attention to handling the possibility that reputation information may be inaccurate
Reputation in multi agent systems and the incentives to provide feedback
The emergence of the Internet leads to a vast increase in the number of interactions between parties that are completely alien to each other. In general, such transactions are likely to be subject to fraud and cheating. If such systems use computerized rational agents to negotiate and execute transactions, mechanisms that lead to favorable outcomes for all parties instead of giving rise to defective behavior are necessary to make the system work: trust and reputation mechanisms. This paper examines different incentive mechanisms helping these trust and reputation mechanisms in eliciting users to report own experiences honestly. --Trust,Reputation
GTRSSN: Gaussian trust and reputation system for sensor networks
This paper introduces a new Gaussian trust and reputation system for wireless sensor networks based on sensed continuous events to address security issues and to deal with malicious and unreliable nodes. It is representing a new approach of calculating trust between sensor nodes based on their sensed data and the reported data from surrounding nodes. It is addressing the trust issue from a continuous sensed data which is different from all other approaches which address the issue from communications and binary point of view. Š Springer Science+Business Media B.V. 2008
A Formal Framework for Concrete Reputation Systems
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions about interaction. However, while trust management is a component in security decision-making, many existing reputation-based trust-management systems provide no formal security-guarantees. In this extended abstract, we describe a mathematical framework for a class of simple reputation-based systems. In these systems, decisions about interaction are taken based on policies that are exact requirements on agentsâ past histories. We present a basic declarative language, based on pure-past linear temporal logic, intended for writing simple policies. While the basic language is reasonably expressive (encoding e.g. Chinese Wall policies) we show how one can extend it with quantification and parameterized events. This allows us to encode other policies known from the literature, e.g., âone-out-of-kâ. The problem of checking a history with respect to a policy is efficient for the basic language, and tractable for the quantified language when policies do not have too many variables
Detection and Filtering of Collaborative Malicious Users in Reputation System using Quality Repository Approach
Online reputation system is gaining popularity as it helps a user to be sure
about the quality of a product/service he wants to buy. Nonetheless online
reputation system is not immune from attack. Dealing with malicious ratings in
reputation systems has been recognized as an important but difficult task. This
problem is challenging when the number of true user's ratings is relatively
small and unfair ratings plays majority in rated values. In this paper, we have
proposed a new method to find malicious users in online reputation systems
using Quality Repository Approach (QRA). We mainly concentrated on anomaly
detection in both rating values and the malicious users. QRA is very efficient
to detect malicious user ratings and aggregate true ratings. The proposed
reputation system has been evaluated through simulations and it is concluded
that the QRA based system significantly reduces the impact of unfair ratings
and improve trust on reputation score with lower false positive as compared to
other method used for the purpose.Comment: 14 pages, 5 figures, 5 tables, submitted to ICACCI 2013, Mysore,
indi
Incremental Trust in Grid Computing
This paper describes a comparative simulation study of some incremental trust and reputation algorithms for handling behavioural trust in large distributed systems, such as those based on the Grid paradigm. Two types of reputation algorithm (based on discrete and Bayesian evaluation of ratings) and two ways of combining direct trust and reputation (discrete combination and combination based on fuzzy logic) are considered. The various combinations of these methods are evaluated from the point of view of their ability to respond to changes in behaviour and the ease with which suitable parameters for the algorithms can be found in the context of Grid computing systems.
Recommended from our members
Opinion Model Based Security Reputation Enabling Cloud Broker Architecture
- âŚ